Sciweavers

5344 search results - page 392 / 1069
» Privacy-Preserving Set Operations
Sort
View
SBP
2010
Springer
15 years 11 months ago
Social Factors in Creating an Integrated Capability for Health System Modeling and Simulation
Abstract. The health system is a complex system of systems – changes in agriculture, transportation, economics, family life, medical practices, and many other things can have a p...
Paul P. Maglio, Melissa Cefkin, Peter J. Haas, Pat...
INFOCOM
2009
IEEE
15 years 11 months ago
Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis
— The automatic detection of failures in IP paths is an essential step for operators to perform diagnosis or for overlays to adapt. We study a scenario where a set of monitors se...
Hung Xuan Nguyen, Renata Teixeira, Patrick Thiran,...
ATVA
2009
Springer
172views Hardware» more  ATVA 2009»
15 years 11 months ago
Symbolic CTL Model Checking of Asynchronous Systems Using Constrained Saturation
Abstract. The saturation state-space generation algorithm has demonstrated clear improvements over state-of-the-art symbolic methods for asynchronous systems. This work is motivate...
Yang Zhao, Gianfranco Ciardo
GECCO
2009
Springer
141views Optimization» more  GECCO 2009»
15 years 11 months ago
Distributed hyper-heuristics for real parameter optimization
Hyper-heuristics (HHs) are heuristics that work with an arbitrary set of search operators or algorithms and combine these algorithms adaptively to achieve a better performance tha...
Marco Biazzini, Balázs Bánhelyi, Alb...
LPNMR
2009
Springer
15 years 11 months ago
A Deductive System for FO(ID) Based on Least Fixpoint Logic
Abstract. The logic FO(ID) uses ideas from the field of logic programming to extend first order logic with non-monotone inductive definitions. The goal of this paper is to exten...
Ping Hou, Marc Denecker